-
1
-
-
35348817139
-
A mean-field analysis of short lived interacting flows
-
June, New York, pp
-
Baccelli, F., Chaintreau, A., Vleeschauwer, D.D. and McDonald, D.R. (2004) 'A mean-field analysis of short lived interacting flows', Proc. ACM SIGMETRICS, June, New York, pp.343-354.
-
(2004)
Proc. ACM SIGMETRICS
, pp. 343-354
-
-
Baccelli, F.1
Chaintreau, A.2
Vleeschauwer, D.D.3
McDonald, D.R.4
-
2
-
-
33750372869
-
Toward a model for sources of internet background radiation
-
March, Adelaide, Australia
-
Barford, P., Nowak, R., Willett, R. and Yegneswaran, V. (2006) 'Toward a model for sources of internet background radiation', Proc. Passive and Active Measurement Conference (PAM'06), March, Adelaide, Australia.
-
(2006)
Proc. Passive and Active Measurement Conference (PAM'06)
-
-
Barford, P.1
Nowak, R.2
Willett, R.3
Yegneswaran, V.4
-
3
-
-
51249086020
-
A closed-form expression for static worm-scanning strategies
-
May, Beijing, China, pp
-
Chen, Z. and Chen, C. (2008) 'A closed-form expression for static worm-scanning strategies', Proc. IEEE International Conference on Communications (ICC'08), May, Beijing, China, pp.1573-1577.
-
(2008)
Proc. IEEE International Conference on Communications (ICC'08)
, pp. 1573-1577
-
-
Chen, Z.1
Chen, C.2
-
4
-
-
36348997064
-
Understanding localized-scanning worms
-
April, New Orleans, LA, pp
-
Chen, Z., Chen, C. and Ji, C. (2007) 'Understanding localized-scanning worms', Proc. 26th IEEE International Performance Computing and Communications Conference (IPCCC'07), April, New Orleans, LA, pp.186-193.
-
(2007)
Proc. 26th IEEE International Performance Computing and Communications Conference (IPCCC'07)
, pp. 186-193
-
-
Chen, Z.1
Chen, C.2
Ji, C.3
-
5
-
-
0042474227
-
Modeling the spread of active worms
-
April, San Francisco, CA, pp
-
Chen, Z., Gao, L. and Kwiat, K. (2003) 'Modeling the spread of active worms', Proc. INFOCOM'03, April, Vol. 3, San Francisco, CA, pp.1890-1900.
-
(2003)
Proc. INFOCOM'03
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
6
-
-
26844473415
-
-
Chen, Z. and Ji, C. (2005a) 'Spatial-temporal modeling of malware propagation in networks', IEEE Transactions on Neural Networks: Special Issue on Adaptive Learning Systems in Communication Networks, 16, No. 5, September, pp.1291-1303.
-
Chen, Z. and Ji, C. (2005a) 'Spatial-temporal modeling of malware propagation in networks', IEEE Transactions on Neural Networks: Special Issue on Adaptive Learning Systems in Communication Networks, Vol. 16, No. 5, September, pp.1291-1303.
-
-
-
-
7
-
-
31844443075
-
A self-learning worm using importance scanning
-
November, Fairfax, VA, pp
-
Chen, Z. and Ji, C. (2005b) 'A self-learning worm using importance scanning', Proc. ACM/CCS Workshop on Rapid Malcode (WORM'05), November, Fairfax, VA, pp.22-29.
-
(2005)
Proc. ACM/CCS Workshop on Rapid Malcode (WORM'05)
, pp. 22-29
-
-
Chen, Z.1
Ji, C.2
-
8
-
-
34548366188
-
Optimal worm-scanning method using vulnerable-host distributions
-
Nos. 1-2, pp
-
Chen, Z. and Ji, C. (2007) 'Optimal worm-scanning method using vulnerable-host distributions', International Journal of Security and Networks: Special Issue on Computer and Network Security, Vol. 2, Nos. 1-2, pp.71-80.
-
(2007)
International Journal of Security and Networks: Special Issue on Computer and Network Security
, vol.2
, pp. 71-80
-
-
Chen, Z.1
Ji, C.2
-
9
-
-
51349126234
-
Spatial-temporal characteristics of internet malicious sources
-
April, Phoenix, AZ, pp
-
Chen, Z., Ji, C. and Barford, P. (2008) 'Spatial-temporal characteristics of internet malicious sources', Proc. INFOCOM'08 Mini-Conference, April, Phoenix, AZ, pp.271-275.
-
(2008)
Proc. INFOCOM'08 Mini-Conference
, pp. 271-275
-
-
Chen, Z.1
Ji, C.2
Barford, P.3
-
11
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an internet worm
-
November, Marseille, France, pp
-
Moore, D., Shannon, C. and Brown, J. (2002) 'Code-Red: A case study on the spread and victims of an internet worm', ACM SIGCOMM Internet Measurement Workshop, November, Marseille, France, pp.273-284.
-
(2002)
ACM SIGCOMM Internet Measurement Workshop
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
12
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
April, San Francisco, CA, pp
-
Moore, D., Shannon, C., Voelker, G. and Savage, S. (2003) 'Internet quarantine: Requirements for containing self-propagating code', Proc. INFOCOM'03, Vol. 3, April, San Francisco, CA, pp.1901-1910.
-
(2003)
Proc. INFOCOM'03
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
13
-
-
34547208045
-
The impact of stochastic variance on worm propagation and detection
-
November, Fairfax, VA, pp
-
Nicol, D.M. (2006) 'The impact of stochastic variance on worm propagation and detection', Proc. ACM/CCS Workshop on Rapid Malcode (WORM'06), November, Fairfax, VA, pp.57-64.
-
(2006)
Proc. ACM/CCS Workshop on Rapid Malcode (WORM'06)
, pp. 57-64
-
-
Nicol, D.M.1
-
14
-
-
0004059061
-
-
Opper, M. and Saad, D, Eds, MIT Press, Cambridge, Massachusetts, February
-
Opper, M. and Saad, D. (Eds.) (2001) Advanced Mean Field Methods, Theory and Practice, MIT Press, Cambridge, Massachusetts, February.
-
(2001)
Advanced Mean Field Methods, Theory and Practice
-
-
-
15
-
-
31844452004
-
On the effectiveness of distributed worm monitoring
-
August, Baltimore, MD, pp
-
Rajab, M.A., Monrose, F. and Terzis, A. (2005) 'On the effectiveness of distributed worm monitoring', Proc. 14th USENIX Security Symposium (Security'05), August, Baltimore, MD, pp.225-237.
-
(2005)
Proc. 14th USENIX Security Symposium (Security'05)
, pp. 225-237
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
-
16
-
-
33748372756
-
Stochastic behavior of random constant scanning worms
-
San Diego, California, USA, pp
-
Rohloff, K. and Basar, T. (2005) 'Stochastic behavior of random constant scanning worms', Proc. 14th ICCCN, San Diego, California, USA, pp.339-344.
-
(2005)
Proc. 14th ICCCN
, pp. 339-344
-
-
Rohloff, K.1
Basar, T.2
-
17
-
-
4344627335
-
The spread of the Witty worm
-
July-August, pp
-
Shannon, C. and Moore, D. (2004) 'The spread of the Witty worm', IEEE Security and Privacy, Vol. 2, No. 4, July-August, pp.46-50.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
18
-
-
85084162258
-
How to 0wn the internet in your spare time
-
August, San Francisco, CA, pp
-
Staniford, S., Paxson, V. and Weaver, N. (2002) 'How to 0wn the internet in your spare time', Proc. 11th USENIX Security Symposium (Security'02), August, San Francisco, CA, pp.149-167.
-
(2002)
Proc. 11th USENIX Security Symposium (Security'02)
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
19
-
-
68149094885
-
-
The CAIDA (2004) Dataset on the Witty Worm, March 19-24, Colleen Shannon and David Moore, http://www.caida.org/data/passive/ witty_worm⊣taset.xml. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members.
-
The CAIDA (2004) Dataset on the Witty Worm, March 19-24, Colleen Shannon and David Moore, http://www.caida.org/data/passive/ witty_worm⊣taset.xml. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members.
-
-
-
-
20
-
-
54549088710
-
On the race of worms, alerts and patches
-
Vojnovic, M. and Ganesh, A.J. (2008) 'On the race of worms, alerts and patches', IEEE/ACM Transactions on Networking, Vol. 16, No. 5, pp.1066-1079.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.5
, pp. 1066-1079
-
-
Vojnovic, M.1
Ganesh, A.J.2
-
21
-
-
51349085987
-
Sampling strategies for epidemic-style information dissemination
-
April, Phoenix, AZ, pp
-
Vojnovic, M., Gupta, V., Karagiannis, T. and Gkantsidis, C. (2008) 'Sampling strategies for epidemic-style information dissemination', Proc. INFOCOM'08, April, Phoenix, AZ, pp.2351-2359.
-
(2008)
Proc. INFOCOM'08
, pp. 2351-2359
-
-
Vojnovic, M.1
Gupta, V.2
Karagiannis, T.3
Gkantsidis, C.4
-
23
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
February, San Diego, CA
-
Wu, J., Vangala, S., Gao, L. and Kwiat, K. (2004) 'An effective architecture and algorithm for detecting worms with various scan techniques', Proc. 11th Ann. Network and Distributed System Security Symposium (NDSS'04), February, San Diego, CA,
-
(2004)
Proc. 11th Ann. Network and Distributed System Security Symposium (NDSS'04)
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
24
-
-
28044469549
-
The monitoring and early detection of internet worms
-
October, pp
-
Zou, C.C., Gong, W., Towsley, D. and Gao, L. (2005) 'The monitoring and early detection of internet worms', IEEE/ACM Transactions on Networking, Vol. 13, No. 5, October, pp.961-974.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
25
-
-
33646400816
-
Advanced routing worm and its security challenges
-
Zou, C.C., Towsley, D., Gong, W. and Cai, S. (2006a) 'Advanced routing worm and its security challenges', Simulation: Transactions of the Society for Modeling and Simulation International, Vol. 82, No. 1, pp.75-85.
-
(2006)
Simulation: Transactions of the Society for Modeling and Simulation International
, vol.82
, Issue.1
, pp. 75-85
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
26
-
-
33646150900
-
On the performance of internet worm scanning strategies
-
July, pp
-
Zou, C.C., Towsley, D. and Gong, W. (2006b) 'On the performance of internet worm scanning strategies', Elsevier Journal of Performance Evaluation, Vol. 63, No. 7, July, pp.700-723.
-
(2006)
Elsevier Journal of Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
27
-
-
68149143110
-
-
May
-
Wikipedia (2009) Mean Field Theory, May, http://en.wikipedia.org/wiki/ Mean_field_theory
-
(2009)
Mean Field Theory
-
-
-
28
-
-
68149127264
-
-
May
-
Wikipedia (2009) Riccati Equation, May, http://en.wikipedia.org/wiki/ Riccati_equation
-
(2009)
Riccati Equation
-
-
-
29
-
-
79958761084
-
-
May
-
Wolfram MathWorld (2009) Logistic Equation, May, http:// mathworld.wolfram.com/LogisticEquation.html
-
(2009)
Logistic Equation
-
-
|